The increasing use of distributed authentication architecture has highlighted interoperability issues of biometric systems. This presentation highlights the ongoing efforts at understanding fingerprint sensor interoperability. BSPA Labs has conducted experiments over the past few years aimed at addressing the challenges related to sensor interoperability. This presentation was given at a research seminar which covered the following: Importance of fingerprint sensor interoperability, sources of issues related to sensor interoperability, analysis framework for evaluating sensor interoperability, discussion of experimental results and its practical applicability
Robustness of Multimodal Biometric Systems under Realistic Spoof Attacks agai...Pluribus One
This document evaluates the robustness of multimodal biometric systems against realistic spoof attacks on all traits. It finds that while multimodal systems are more robust than unimodal ones under attack, their performance is still worsened significantly, showing they can be cracked by spoofing all traits. The study also finds that the common assumption of a "worst-case scenario" is not a good approximation of realistic attacks, and a new method is needed to properly evaluate system robustness under attack without constructing spoofed data sets.
The document discusses findings from a primary user survey conducted about e-retailing in India. It provides details on the survey methodology including 15 value parameters examined and 78 questions. Results are presented on the Cronbach alpha reliability scores for each value parameter. Additional analysis examines differences in responses between student and working groups and between males and females. Key insights found that students preferred more flexible payment options while working individuals valued discounts more. Females placed slightly more importance on packaging than males. Respondents overall expressed a lack of trust and desire for faster delivery options.
Fishing or a Z?: Investigating the Effects of Error on Mimetic and Alphabet D...Abdallah El Ali
Slides for the talk I gave at ICMI 2012, held in Santa Monica, CA, USA.
The full paper reference is:
El Ali, A., Kildal, J. & Lantz, V. (2012). Fishing or a Z?: Investigating the Effects of Error on Mimetic and Alphabet Device-based Gesture Interaction. In Proceedings of the 14th international conference on Multimodal Interaction (ICMI '12), 2012, Santa Monica, California.
This document discusses malpractice insurance risks for advanced practice nurses (APNs) and ways to reduce those risks. It notes that APNs can face financial exposure from lawsuits, loss of licensure, or criminal penalties for errors or noncompliance with laws. While many APNs believed they had protection through hospital employment in the past, they now need their own malpractice insurance given today's litigious environment. The document provides tips for APNs to manage risks and properly handle any potential malpractice claims or lawsuits.
The document discusses access to healthcare as defined by Healthy People 2020, including key determinants of health and implications of access such as quality of care and equitable delivery of services. It also outlines dimensions of access related to availability, accessibility, affordability, accommodation, and acceptability. Barriers to access and populations most affected are identified along with solutions provided by the Affordable Care Act.
The document discusses rising health care costs in the United States from 1969 to 2004, factors contributing to increased costs such as an aging population and technology, and responses to rising costs including managed care and malpractice reform. It also covers health care financing through programs like Medicare, Medicaid and private insurance, as well as the growing number of uninsured Americans.
Barriers to access of quality renal replacement therapy in endstage renal dis...iosrjce
IOSR Journal of Nursing and health Science is ambitious to disseminate information and experience in education, practice and investigation between medicine, nursing and all the sciences involved in health care.
Nursing & Health Sciences focuses on the international exchange of knowledge in nursing and health sciences. The journal publishes peer-reviewed papers on original research, education and clinical practice.
By encouraging scholars from around the world to share their knowledge and expertise, the journal aims to provide the reader with a deeper understanding of the lived experience of nursing and health sciences and the opportunity to enrich their own area of practice.The journal publishes original papers, reviews, special and general articles, case management etc.
This document provides specifications for various biometric access control devices produced by CINT. It includes fingerprint time and attendance machines, access control terminals that support fingerprint, card, and password authentication. The models vary in supported users from 500-30,000, transaction logs from 50,000-1,00,000, dimensions, battery backup options, and connectivity including TCP/IP, USB, and WiFi. Features include fast fingerprint matching speeds below 1 second, durable optical sensors, and graphical interfaces.
Robustness of Multimodal Biometric Systems under Realistic Spoof Attacks agai...Pluribus One
This document evaluates the robustness of multimodal biometric systems against realistic spoof attacks on all traits. It finds that while multimodal systems are more robust than unimodal ones under attack, their performance is still worsened significantly, showing they can be cracked by spoofing all traits. The study also finds that the common assumption of a "worst-case scenario" is not a good approximation of realistic attacks, and a new method is needed to properly evaluate system robustness under attack without constructing spoofed data sets.
The document discusses findings from a primary user survey conducted about e-retailing in India. It provides details on the survey methodology including 15 value parameters examined and 78 questions. Results are presented on the Cronbach alpha reliability scores for each value parameter. Additional analysis examines differences in responses between student and working groups and between males and females. Key insights found that students preferred more flexible payment options while working individuals valued discounts more. Females placed slightly more importance on packaging than males. Respondents overall expressed a lack of trust and desire for faster delivery options.
Fishing or a Z?: Investigating the Effects of Error on Mimetic and Alphabet D...Abdallah El Ali
Slides for the talk I gave at ICMI 2012, held in Santa Monica, CA, USA.
The full paper reference is:
El Ali, A., Kildal, J. & Lantz, V. (2012). Fishing or a Z?: Investigating the Effects of Error on Mimetic and Alphabet Device-based Gesture Interaction. In Proceedings of the 14th international conference on Multimodal Interaction (ICMI '12), 2012, Santa Monica, California.
This document discusses malpractice insurance risks for advanced practice nurses (APNs) and ways to reduce those risks. It notes that APNs can face financial exposure from lawsuits, loss of licensure, or criminal penalties for errors or noncompliance with laws. While many APNs believed they had protection through hospital employment in the past, they now need their own malpractice insurance given today's litigious environment. The document provides tips for APNs to manage risks and properly handle any potential malpractice claims or lawsuits.
The document discusses access to healthcare as defined by Healthy People 2020, including key determinants of health and implications of access such as quality of care and equitable delivery of services. It also outlines dimensions of access related to availability, accessibility, affordability, accommodation, and acceptability. Barriers to access and populations most affected are identified along with solutions provided by the Affordable Care Act.
The document discusses rising health care costs in the United States from 1969 to 2004, factors contributing to increased costs such as an aging population and technology, and responses to rising costs including managed care and malpractice reform. It also covers health care financing through programs like Medicare, Medicaid and private insurance, as well as the growing number of uninsured Americans.
Barriers to access of quality renal replacement therapy in endstage renal dis...iosrjce
IOSR Journal of Nursing and health Science is ambitious to disseminate information and experience in education, practice and investigation between medicine, nursing and all the sciences involved in health care.
Nursing & Health Sciences focuses on the international exchange of knowledge in nursing and health sciences. The journal publishes peer-reviewed papers on original research, education and clinical practice.
By encouraging scholars from around the world to share their knowledge and expertise, the journal aims to provide the reader with a deeper understanding of the lived experience of nursing and health sciences and the opportunity to enrich their own area of practice.The journal publishes original papers, reviews, special and general articles, case management etc.
This document provides specifications for various biometric access control devices produced by CINT. It includes fingerprint time and attendance machines, access control terminals that support fingerprint, card, and password authentication. The models vary in supported users from 500-30,000, transaction logs from 50,000-1,00,000, dimensions, battery backup options, and connectivity including TCP/IP, USB, and WiFi. Features include fast fingerprint matching speeds below 1 second, durable optical sensors, and graphical interfaces.
The document discusses different types of wiring used in building management systems, including control wiring, power wiring, and communication wiring. It provides details on wire types for various applications, such as CAT5 or CAT6 cable for communication between DDC controllers. Diagrams show typical system architectures and wiring schematics for HVAC components like VAV boxes and precision air conditioners connected over a BACnet network through a gateway.
The document discusses several barriers to accessing health and social care services: inadequate resources due to lack of funding, staff, and equipment can lead to delays in treatment; physical difficulties in traveling to services; issues with communication for those who do not speak the local language, are deaf/blind, or illiterate; and ignorance about available services. It provides examples of each barrier and proposes ways to overcome them, such as increasing funding, extended service hours, improved transportation options, multi-lingual materials, sign language interpretation, and community outreach/advertising.
This is density based traffic light control system using Programmable logic controller(PLC). Then side which have more vehicles(density) will be getting on first. This process will take place according to number of vehicles.
Integrating fire protection and fire alarm systems with building automation systems (BAS) can offer efficient and cost-effective operation. The design and installation of an integrated system must also be well-planned and coordinated, and the system must be properly maintained over its lifetime. The need for multidisciplinary coordination between the fire protection engineer and the mechanical and electrical engineers during design and construction are of key importance. Design engineers also must involve the building owner and/or operator in establishing (or at least influencing) the design criteria of the building. The owner/operator must understand that the efficiencies gained by integration will pay dividends long into the lifecycle of the building.
Like a BAS, fire protection and alarm systems have also evolved into sophisticated computer-based systems, which offers more opportunities to integrate these systems to develop a more complete building response as part of overall building operations during an emergency event.
On Friday June, 1st. 2012 we held a small seminar on Home and Building Automation Technologies, with a particular focus on peculiarities, issues and idiosyncrasies to account when starting to integrate a new technology in Dog.
After a first introduction on the general concepts of Home and Building Automation, the seminar focuses on 3 main technologies: MyOpen, KNX and Modbus and for each of them provides a short introduction highlighting the relevant features to account when integrating such technologies in Dog. The last part of the seminar analyzes the design and implementation choices driving the integration of such technologies in Dog, with a particular focus on the abstraction process.
The seminar is the first of 2 presentations on the Home and Building Automation topic. The next seminar will be held on Wednesday June 6th, 2012, and will focus on the Dog gateway, by providing a deep architecture analysis and by proposing several development guidelines.
The document discusses building automation and controls, including a brief history of controls systems from the 1950s to present. It covers current issues like proprietary vs open protocols and trends like wireless integration. The future of building automation systems is predicted to include more internet-based integration, use of web services, and systems that increasingly manage energy and retro-commission buildings through self-tuning controls.
The document discusses different types of programming languages used in programmable logic controllers (PLCs), including ladder logic, Boolean logic, and Grafcet. It provides details on each language and describes common instruction sets used, such as timers, counters, arithmetic, and data manipulation. The document also covers IEC 61131-3 standard languages like ladder diagrams, function block diagrams, instruction lists, structured text, and sequential function charts. Finally, it discusses PLC architecture and different I/O bus network standards and configurations.
The document discusses the Andersen Model of health care access. The model conceptualizes access as being determined by population characteristics (contextual and individual factors) that predispose people to use services or enable/impede their use. These include demographic, social, health beliefs, and enabling resources factors. The model also considers people's need (perceived and evaluated by professionals) and how this influences health behaviors and outcomes. It provides a framework for examining equitable access to care based on need rather than social characteristics or enabling resources.
The document discusses automation and programmable logic controllers (PLCs). It describes how automation delegates human control functions to equipment to achieve higher productivity, superior product quality, efficient energy usage, and improved safety. It then defines PLCs, explaining that they are industrial computers that monitor inputs, make decisions based on programs, and control outputs to automate processes. PLCs have input and output modules, a central processing unit, memory, and power supply. They use ladder logic programming and have advantages like increased reliability but also disadvantages like high initial costs. The document also briefly introduces supervisory control and data acquisition (SCADA) systems.
Hank Scutoski and Chander Sekar presented at the Southwest Test Conference on Gage R&R studies. They discussed how Gage R&R studies are important to understand measurement system capability before comparing or controlling manufacturing processes. The presentation covered key topics like repeatability, reproducibility, sources of variation, how to perform Gage R&R studies, and ways to analyze the data including calculating precision-to-tolerance ratios. The goal is to use statistical tools and Gage R&R results to improve processes and ensure consistent high quality products.
A Bayesian Approach for Modeling SensorInfluence on Quality, Liveness and Ma...AjitaRattani
This document presents a Bayesian approach for modeling the influence of sensors on match scores, quality values, and liveness measures in fingerprint verification. The approach develops a graphical model that accounts for the impact of the sensor on these three variables. The model is evaluated on fingerprint data from two different sensors in the LivDet 2011 database. Experimental results show that existing fusion approaches do not perform well in a multi-sensor environment, while the proposed graphical model effectively operates across different sensors. The graphical model improves fingerprint spoof detection by explicitly modeling the relationship between the sensor and match scores, quality, and liveness values.
The document proposes a reliable fingerprint matching system using filter-based and Euclidean distance algorithms. It aims to improve accuracy of fingerprint matching by addressing issues caused by fingertip surface conditions and image quality. The proposed system extracts minutiae points using Gabor filters and matches fingerprints based on minutiae configuration and pore distances calculated using k-nearest neighbors algorithm. Testing on 20 fingerprints showed an average matching accuracy of 95-99% using this approach.
This study examines the difficulty of forging signatures by collecting data from surveys of semi-experts in biometrics. The surveys focused on specific aspects of signatures that forgers would consider when trying to replicate a signature. The results of the surveys were then analyzed to determine which features were most difficult for forgers to replicate. The goal was to better understand forgers' perceptions of difficulty before examining actual forged signatures.
This document discusses different types of biometric identification and verification methods, focusing on fingerprint recognition. It explains that biometric systems can operate through identification, comparing an unknown sample to many in a database, or verification, comparing a sample to a single stored template. Fingerprint recognition involves scanning a fingerprint, extracting unique minutiae characteristics rather than saving an image, and matching those characteristics through algorithms during enrollment, searching, or verification. The document outlines the fingerprint processing steps of image capture, enhancement, thinning, minutiae detection and extraction, and post processing used for both enrollment and verification. It concludes that while technology and security risks are both growing, adopting biometrics can help agencies including libraries improve security and safety.
This document discusses quality and the challenges of maintaining quality. It notes that customer expectations and demands are increasing while loyalty is decreasing. It emphasizes the importance of building a quality image for Indonesian products and services and ensuring that all work meets certification standards. Maintaining quality requires having proper data and planning without assumptions. Quality leadership is needed to address challenges such as rising customer purchasing power, increasing customer value expectations, and greater demand variability.
Adapting ISO 20462 Softcopy Quality Ruler Method for on-line Image Quality St...Burns Digital Imaging LLC
The document describes adapting the ISO 20462 quality ruler method for online image quality studies. It discusses presenting a softcopy quality ruler using buttons instead of a slider to compare test images to references. Images were cropped to fit screens and a previous study was replicated online. Results showed similar scene sensitivity and were consistent with prior calibrated studies, suggesting the online method relates to ISO standards. Uncontrolled views showed more sensitivity than expected. The method allows efficient large-scale image quality evaluations.
Ubiquitious Computing system : Integrating RFID with Face Recognition systemsShahryar Ali
This document describes a student attendance system that integrates RFID and face recognition technologies. RFID tags are used to record when students enter the classroom, while a camera and face recognition software verify students' identities. The system aims to automate attendance tracking and prevent illegal use of RFID cards. It discusses the components, workings, and standards of RFID systems as well as an overview of face recognition using principal component analysis. MATLAB is used to implement a prototype that detects faces in images and recognizes students with over 95% accuracy based on a real-time face database. The integrated system aims to provide efficient, secure, and error-free attendance tracking.
An Efficient Approach to Extract Singular Points for Fingerprint RecognitionMesbah Uddin Khan
Many approaches have been proposed for developing fingerprint recognition systems. Some of them give inaccurate results due to low-quality images or have high time cost. The presentation focuses on singular points extraction from low quality image and then matching fingerprint within low time cost.
This study evaluated the effectiveness quality of fingerprint images obtained from two populations interacting with two commercially available fingerprint recognition sensors (one capacitance, one optical). Currently, there is a lack of information within the biometric community pertaining to fingerprint image quality and an elderly population. Therefore, this study specifically examined the fingerprint image quality of an elderly population (55+) to that of an 18-25 year old population baseline. Key individual variables that may have an influence on image quality were collected and examined. These variables included age, gender, thnicity, handedness, moisture content of
each index finger, occupation(s)/hobby(ies), use of hand moisturizers, and prior use of
fingerprint devices.
This document proposes a hybrid authentication system that uses both short-term and long-term user behavior modeling. It extracts multiple unique features from a user's recent behavior and stores them in models. An ensemble classifier analyzes the features to authenticate the user. If the recent behavior is consistent with both models, authentication is granted without credentials. Otherwise, credentials are requested. Experimental results show the system can accurately model two users' daily calling and location patterns over time for authentication.
The document discusses different types of wiring used in building management systems, including control wiring, power wiring, and communication wiring. It provides details on wire types for various applications, such as CAT5 or CAT6 cable for communication between DDC controllers. Diagrams show typical system architectures and wiring schematics for HVAC components like VAV boxes and precision air conditioners connected over a BACnet network through a gateway.
The document discusses several barriers to accessing health and social care services: inadequate resources due to lack of funding, staff, and equipment can lead to delays in treatment; physical difficulties in traveling to services; issues with communication for those who do not speak the local language, are deaf/blind, or illiterate; and ignorance about available services. It provides examples of each barrier and proposes ways to overcome them, such as increasing funding, extended service hours, improved transportation options, multi-lingual materials, sign language interpretation, and community outreach/advertising.
This is density based traffic light control system using Programmable logic controller(PLC). Then side which have more vehicles(density) will be getting on first. This process will take place according to number of vehicles.
Integrating fire protection and fire alarm systems with building automation systems (BAS) can offer efficient and cost-effective operation. The design and installation of an integrated system must also be well-planned and coordinated, and the system must be properly maintained over its lifetime. The need for multidisciplinary coordination between the fire protection engineer and the mechanical and electrical engineers during design and construction are of key importance. Design engineers also must involve the building owner and/or operator in establishing (or at least influencing) the design criteria of the building. The owner/operator must understand that the efficiencies gained by integration will pay dividends long into the lifecycle of the building.
Like a BAS, fire protection and alarm systems have also evolved into sophisticated computer-based systems, which offers more opportunities to integrate these systems to develop a more complete building response as part of overall building operations during an emergency event.
On Friday June, 1st. 2012 we held a small seminar on Home and Building Automation Technologies, with a particular focus on peculiarities, issues and idiosyncrasies to account when starting to integrate a new technology in Dog.
After a first introduction on the general concepts of Home and Building Automation, the seminar focuses on 3 main technologies: MyOpen, KNX and Modbus and for each of them provides a short introduction highlighting the relevant features to account when integrating such technologies in Dog. The last part of the seminar analyzes the design and implementation choices driving the integration of such technologies in Dog, with a particular focus on the abstraction process.
The seminar is the first of 2 presentations on the Home and Building Automation topic. The next seminar will be held on Wednesday June 6th, 2012, and will focus on the Dog gateway, by providing a deep architecture analysis and by proposing several development guidelines.
The document discusses building automation and controls, including a brief history of controls systems from the 1950s to present. It covers current issues like proprietary vs open protocols and trends like wireless integration. The future of building automation systems is predicted to include more internet-based integration, use of web services, and systems that increasingly manage energy and retro-commission buildings through self-tuning controls.
The document discusses different types of programming languages used in programmable logic controllers (PLCs), including ladder logic, Boolean logic, and Grafcet. It provides details on each language and describes common instruction sets used, such as timers, counters, arithmetic, and data manipulation. The document also covers IEC 61131-3 standard languages like ladder diagrams, function block diagrams, instruction lists, structured text, and sequential function charts. Finally, it discusses PLC architecture and different I/O bus network standards and configurations.
The document discusses the Andersen Model of health care access. The model conceptualizes access as being determined by population characteristics (contextual and individual factors) that predispose people to use services or enable/impede their use. These include demographic, social, health beliefs, and enabling resources factors. The model also considers people's need (perceived and evaluated by professionals) and how this influences health behaviors and outcomes. It provides a framework for examining equitable access to care based on need rather than social characteristics or enabling resources.
The document discusses automation and programmable logic controllers (PLCs). It describes how automation delegates human control functions to equipment to achieve higher productivity, superior product quality, efficient energy usage, and improved safety. It then defines PLCs, explaining that they are industrial computers that monitor inputs, make decisions based on programs, and control outputs to automate processes. PLCs have input and output modules, a central processing unit, memory, and power supply. They use ladder logic programming and have advantages like increased reliability but also disadvantages like high initial costs. The document also briefly introduces supervisory control and data acquisition (SCADA) systems.
Hank Scutoski and Chander Sekar presented at the Southwest Test Conference on Gage R&R studies. They discussed how Gage R&R studies are important to understand measurement system capability before comparing or controlling manufacturing processes. The presentation covered key topics like repeatability, reproducibility, sources of variation, how to perform Gage R&R studies, and ways to analyze the data including calculating precision-to-tolerance ratios. The goal is to use statistical tools and Gage R&R results to improve processes and ensure consistent high quality products.
A Bayesian Approach for Modeling SensorInfluence on Quality, Liveness and Ma...AjitaRattani
This document presents a Bayesian approach for modeling the influence of sensors on match scores, quality values, and liveness measures in fingerprint verification. The approach develops a graphical model that accounts for the impact of the sensor on these three variables. The model is evaluated on fingerprint data from two different sensors in the LivDet 2011 database. Experimental results show that existing fusion approaches do not perform well in a multi-sensor environment, while the proposed graphical model effectively operates across different sensors. The graphical model improves fingerprint spoof detection by explicitly modeling the relationship between the sensor and match scores, quality, and liveness values.
The document proposes a reliable fingerprint matching system using filter-based and Euclidean distance algorithms. It aims to improve accuracy of fingerprint matching by addressing issues caused by fingertip surface conditions and image quality. The proposed system extracts minutiae points using Gabor filters and matches fingerprints based on minutiae configuration and pore distances calculated using k-nearest neighbors algorithm. Testing on 20 fingerprints showed an average matching accuracy of 95-99% using this approach.
This study examines the difficulty of forging signatures by collecting data from surveys of semi-experts in biometrics. The surveys focused on specific aspects of signatures that forgers would consider when trying to replicate a signature. The results of the surveys were then analyzed to determine which features were most difficult for forgers to replicate. The goal was to better understand forgers' perceptions of difficulty before examining actual forged signatures.
This document discusses different types of biometric identification and verification methods, focusing on fingerprint recognition. It explains that biometric systems can operate through identification, comparing an unknown sample to many in a database, or verification, comparing a sample to a single stored template. Fingerprint recognition involves scanning a fingerprint, extracting unique minutiae characteristics rather than saving an image, and matching those characteristics through algorithms during enrollment, searching, or verification. The document outlines the fingerprint processing steps of image capture, enhancement, thinning, minutiae detection and extraction, and post processing used for both enrollment and verification. It concludes that while technology and security risks are both growing, adopting biometrics can help agencies including libraries improve security and safety.
This document discusses quality and the challenges of maintaining quality. It notes that customer expectations and demands are increasing while loyalty is decreasing. It emphasizes the importance of building a quality image for Indonesian products and services and ensuring that all work meets certification standards. Maintaining quality requires having proper data and planning without assumptions. Quality leadership is needed to address challenges such as rising customer purchasing power, increasing customer value expectations, and greater demand variability.
Adapting ISO 20462 Softcopy Quality Ruler Method for on-line Image Quality St...Burns Digital Imaging LLC
The document describes adapting the ISO 20462 quality ruler method for online image quality studies. It discusses presenting a softcopy quality ruler using buttons instead of a slider to compare test images to references. Images were cropped to fit screens and a previous study was replicated online. Results showed similar scene sensitivity and were consistent with prior calibrated studies, suggesting the online method relates to ISO standards. Uncontrolled views showed more sensitivity than expected. The method allows efficient large-scale image quality evaluations.
Ubiquitious Computing system : Integrating RFID with Face Recognition systemsShahryar Ali
This document describes a student attendance system that integrates RFID and face recognition technologies. RFID tags are used to record when students enter the classroom, while a camera and face recognition software verify students' identities. The system aims to automate attendance tracking and prevent illegal use of RFID cards. It discusses the components, workings, and standards of RFID systems as well as an overview of face recognition using principal component analysis. MATLAB is used to implement a prototype that detects faces in images and recognizes students with over 95% accuracy based on a real-time face database. The integrated system aims to provide efficient, secure, and error-free attendance tracking.
An Efficient Approach to Extract Singular Points for Fingerprint RecognitionMesbah Uddin Khan
Many approaches have been proposed for developing fingerprint recognition systems. Some of them give inaccurate results due to low-quality images or have high time cost. The presentation focuses on singular points extraction from low quality image and then matching fingerprint within low time cost.
This study evaluated the effectiveness quality of fingerprint images obtained from two populations interacting with two commercially available fingerprint recognition sensors (one capacitance, one optical). Currently, there is a lack of information within the biometric community pertaining to fingerprint image quality and an elderly population. Therefore, this study specifically examined the fingerprint image quality of an elderly population (55+) to that of an 18-25 year old population baseline. Key individual variables that may have an influence on image quality were collected and examined. These variables included age, gender, thnicity, handedness, moisture content of
each index finger, occupation(s)/hobby(ies), use of hand moisturizers, and prior use of
fingerprint devices.
This document proposes a hybrid authentication system that uses both short-term and long-term user behavior modeling. It extracts multiple unique features from a user's recent behavior and stores them in models. An ensemble classifier analyzes the features to authenticate the user. If the recent behavior is consistent with both models, authentication is granted without credentials. Otherwise, credentials are requested. Experimental results show the system can accurately model two users' daily calling and location patterns over time for authentication.
Detecting and Improving Distorted Fingerprints using rectification techniques.sandipan paul
In this detection and improving distorted fingerprint using rectification techniques like SVM, PCA classifier etc.
In this ppt a distorted fingerprint is taken and improve that distorted fingerprint into normal one.
Qualifications And Experience PresentationKevin Baker
The document discusses the author's background and accomplishments in physics and optical coherence tomography (OCT). It then summarizes the author's work developing algorithms to analyze OCT signals and images for non-invasive glucose monitoring. Key contributions included preprocessing algorithms to reduce noise, aggregating 3D OCT images into 1D signals, and using multivariate statistics to understand trends in the data and identify outliers. The goal was to optimize the system performance and mitigate sources of error like motion artifacts.
MAGIC: A Motion Gesture Design Tool
Daniel Ashbrook, Georgia Tech and Nokia Research Center Hollywood
Thad Starner, Georgia Tech
http://research.nokia.com/files/2010-Ashbrook-CHI10-MAGIC.pdf
Presented at the 28th Annual ACM SIGCHI Conference on Human Factors in Computing Systems (CHI)
Abstract:
Devices capable of gestural interaction through motion sensing are increasingly becoming available to consumers; however, motion gesture control has yet to appear outside of game consoles. Interaction designers are frequently not expert in pattern recognition, which may be one reason for this lack of availability. Another issue is how to effectively test gestures to ensure that they are not unintentionally activated by a user’s normal movements during everyday usage. We present MAGIC, a gesture design tool that addresses both of these issues, and detail the results of an evaluation.
This document summarizes research on optimized fingerprint compression without loss of data. It discusses how fingerprint recognition works by extracting minutiae features from fingerprints. It then describes the proposed fingerprint recognition method using minutiae score matching (FRMSM), which uses block filtering for thinning fingerprints to preserve image quality while extracting minutiae. Experimental results showed the false matching ratio was better than existing algorithms. The document also provides background on biometric systems and fingerprint recognition. It reviews related work on fingerprint enhancement, orientation field estimation, and minutiae extraction. The proposed system describes a line extraction and graph matching approach for fingerprint matching with improved robustness. Modules for the system include authentication, image capturing, fingerprint matching, binarization, and
Sociocast NODE vs. Collaborative Filtering BenchmarkAlbert Azout
This document benchmarks the performance of Sociocast's proprietary NODE algorithm against a collaborative filtering algorithm for predicting social bookmarking activity. Testing was done on a dataset of over 14,000 users from Delicious with bookmarks classified into 434 categories. NODE significantly outperformed collaborative filtering, achieving precision, recall, and F1 scores between 3.89 and 9.93 times better across different recommendation levels. This shows NODE is more effective at predicting future user behaviors and interests.
A-Study-on-Binary-Number-of-Gender-Identification-Based-on-FingerprintsArindam Paul
This document presents a study on using fingerprints to identify the gender of individuals. The study uses a database of 400 fingerprint images (200 male and 200 female). Fingerprints are preprocessed using discrete wavelet transform and converted to binary images. The number of white pixels and total block pixels are counted and converted to binary numbers. The length of these binary numbers is then used to classify gender, with lengths of 15 digits or more indicating male and less than 15 indicating female. Experimental results show an accuracy of 88.75% using this single feature of binary length. The study concludes that fingerprints can effectively be used to determine gender with applications in security and forensic analysis. Future work aims to improve accuracy by collecting more data and extracting additional fingerprint features.
A REVIEW ON LATENT FINGERPRINT RECONSTRUCTION METHODSIRJET Journal
This document reviews several methods for reconstructing latent fingerprints from minutiae points. It begins with an introduction to fingerprint features and representation. It then summarizes 10 research papers on latent fingerprint reconstruction methods. These include approaches using deep learning networks, fusion of minutiae and pore features, progressive feedback mechanisms, orientation field and phase reconstruction, and other techniques. The document concludes that while reconstruction methods have improved, there remains a performance gap when matching reconstructed prints to originals. The purpose is to provide a comparative analysis of existing latent fingerprint reconstruction methods.
How to easily improve quality using automated visual inspectionDesign World
Mis-registered parts, out of tolerance parts or defective assemblies are costly mistakes in today’s manufacturing environments. Reducing scrap by catching deviations in the manufacturing process early are key to keeping profit margins high.
Automated inspection using Vision Sensors provide 100% inspection. Learn how the VeriSens Vision sensors ease of use combined with powerful inspection tools catches detects during assembly. Join us in an educational based webinar to demonstrate how to improve quality using automated visual inspection.
Watch this webinar to learn:
-What is a vision sensor?
-What type of applications are suited for vision sensors
-How to easily setup a vision application with VeriSens vision sensors
IRJET-Computer Aided Touchless Palmprint Recognition Using SiftIRJET Journal
This document discusses a computer aided touchless palmprint recognition system using Scale Invariant Feature Transform (SIFT). SIFT is used to extract features from touchless palmprint images that are invariant to changes in scale, rotation, and translation. The system involves preprocessing images, extracting SIFT features, and matching features to recognize and authenticate individuals. An experiment was conducted using 16 real palmprint images with varying conditions. The system achieved 93.75% accuracy in recognition using SIFT features, demonstrating its effectiveness for touchless palmprint recognition compared to other approaches. Future work could explore using color information and developing algorithms to handle variations like cosmetics or injuries.
Similar to Fingerprint Interoperability Seminar (20)
This research focused on classifying Human-Biometric Sensor Interaction errors in real-time. The Kinect 2 was used as a measuring device to track the position and movements of the subject through a simulated border control environment. Knowing, in detail, the state of the subject ensures that the human element of the HBSI model is analyzed accurately. A network connection was established with the iris device to know the state of the sensor and biometric system elements of the model. Information such as detection rate, extraction rate, quality, capture type, and more metrics was available for use in classifying HBSI errors. A Federal Inspection Station (FIS) booth was constructed to simulate a U.S. border control setting in an International airport. The subjects were taken through the process of capturing iris and fingerprint samples in an immigration setting. If errors occurred, the Kinect 2 program would classify the error and saved these for further analysis.
IT 34500 is an undergraduate course offered to Purdue West Lafayette students. The course gives an introduction into biometrics and automatic identification and data capture technologies
The human signature provides a natural and publically-accepted legally-admissible method for providing authentication to a process. Automatic biometric signature systems assess both the drawn image and the temporal aspects of signature construction, providing enhanced verification rates over and above conventional outcome assessment. To enable the capture of these constructional data requires the use of specialist ‘tablet’ devices. In this paper we explore the enrolment performance using a range of common signature capture devices and investigate the reasons behind user preference. The results show that writing feedback and familiarity with conventional ‘paper and pen’ donation configurations are the primary motivation for user preference. These results inform the choice of signature device from both technical performance and user acceptance viewpoints.
The inherent differences between secret-based authentication (such as passwords and PINs) and biometric authentication have left gaps in the credibility of biometrics. These gaps are due, in large part, to the inability to adequately cross-compare the two types of authentication. This paper provides a comparison between the two types of authentication by equating biometric entropy in the same way entropy of secrets are represented. Similar to the method used by Ratha, Connell, and Bolle [1], the x and y dimensions of the fingerprints were examined to determine all possible locations of minutiae. These locations were then examined based on the observed probability of minutiae occurring in each of the designated locations. The results of this work show statistically significant differences in the frequencies and probabilities of occurrence for minutiae location, type, and angle, across all possible minutiae locations. These components were applied to Shannon’s Information Theory [2] to determine the entropy of fingerprint biometrics, which was estimated to be equivalent to an 8.3-character, randomly chosen password
This course covers biometric usability testing with a focus on border control and mobile devices. The course objectives are to understand biometric systems, how people use them, testing methodologies, limitations, and research methods. Topics include genuine users, usability, attacks, border security, tokens, qualitative/quantitative research, and focus groups. Students will complete a research-based group project, assignments, and quizzes. The course uses lectures, discussions, guest speakers and students are expected to regularly attend and complete all work.
This document examines the stability of iris recognition over short periods of time. It analyzes iris scan data from 60 participants in a single visit lasting 10 minutes or less. The stability of each iris is measured using a stability score index. Statistical analysis finds no significant difference in stability scores between age groups, gender, or ethnicity. This suggests the iris remains stable within a single visit. Future work could examine stability over longer time periods and whether it decreases with more extended testing.
In this research, intra-visit match score stability was examined for the human iris. Scores were found to be statistically stable in this short time frame.
In this research, intra-visit match score stability was examined for the human iris. Scores were found to be statistically stable in this short time frame.
In this research, intra-visit match score stability was examined for the human iris. Scores were found to be statistically stable in this short time frame.
In this research, intra-visit match score stability was examined for the human iris. Scores were found to be statistically stable in this short time frame.
A lot of work done in Center recently has focused around different topics concerning "time". Iris stability across different "times" has been in the forefront due to work in the undergraduate class, IT345, the graduate class IT545, as well as work in Ben Petry's thesis. Of course "time" is a fairly inaccurate word to use. Assessing stability over time is very ambiguous to the research question. For example time may mean millisecond, months, years, or even life of the user. Upon further examination of other academic literature, the reporting of research duration, collection interval, and specific time frame of interest are sporadic at best and missing completely at worst. To solve this issue, the Center has created the biometric duration scale (BDS) model with associated suggested best practices for reporting time duration in biometrics.
The BDS model marries the general biometric model with HBSI model to create a logical flow of five phases: the presentation definition phase, sample phase, processing phase, and enrollment or matching phase. By tracking information through this progression such as specific subject presentations made, HBSI error, and FTE/Enrollment score (to name a few), performance within the general biometric model can be examined. The BDS model goes one step further by creating specific durations to report research specific metrics. By creating this model, outcomes that effect a yearly performance metrics can be looked at by examining monthly performance, daily performance, or even specific user presentations and how those subcomponents effect the whole system.
Additionally, best practices for the reporting of duration is also included. The reporting methodology stems from ISO 8601 and is in compliance with ISO 21920. In the common reporting structure, start date, duration, number of visits at how many intervals, and time scope of interest for the specific research are given in a logical, readily available format along with the very specific, detailed ISO 8601 methodology. The goal of creating a formal script for reporting research duration was to eliminate ambiguity and create an environment where replication and drawing parallels between research is encouraged.
The document examines the stability of iris recognition over a short period of time. It discusses how iris recognition works and why the iris is considered unique and stable over time. The research presented in the document analyzed iris image data collected over four weekly visits. The results showed no statistically significant difference in iris matching scores between the different visits, suggesting the iris is stable over a short time period. This supports the idea that the iris can be used for biometric identification applications that require stability over time.
ICBR has been involved in standards development for over 14 years through committees like INCITS M1 and ISO/IEC JTC1 SC37. To provide students real-world experience, students participated on these committees by submitting documents, comments, and reviews. This engagement between academia and standards development benefits both fields by allowing applied research and education in new and emerging technical areas.
The stability score index, conceptualized in 2013, was designed to address the weaknesses of the zoo menagerie and other performance metrics by quantifying the relative stability of a user from on condition to another. In this paper, the measure of interoperability is the stability score from enrolling on one sensor and verifying on multiple sensors. The results showed that like performance, individual performance were not stable across these sensors. When examining stability by sensor family (capacitance, optical and thermal) we find that capacitive as the enrollment sensor were the least stable. Both enrolling and verifying on a thermal sensor, individuals were the most stable of the three family types. With respect to interaction type, enrolling on touch and verifying on swipe was more stable than enrolling on swipe and verifying on swipe, which was an interesting finding. Individuals using the thermal sensor generated the most stable stability scores.
This document discusses advances in testing and evaluating human-biometric sensor interaction using a new model. It describes gaps in traditional biometric testing, such as how users interact with systems. A new Human Biometric Sensor Interaction model is presented and has been tested on iris and fingerprint biometrics. The model has been expanded to more complex systems like border gates. Testing looks at how users interact with biometric systems in different environments and factors like throughput. The goal is to better test and evaluate systems without overburdening test facilities.
This document discusses biometric testing and evaluation. It covers traditional biometric algorithm testing and more complex operational testing. There are gaps in areas like training, accessibility, human factors, and determining what causes errors. Filling these gaps is an ongoing work in progress as biometric devices become more complex and deployed in more environments and applications. Different types of testing include technology, scenario, and operational evaluations to adequately assess performance and usability.
This course provides an overview of biometric technology as it relates to security, access control, and authentication. It examines basic biometric terminology and various biometric modalities such as fingerprint, face, and iris recognition. Students will learn about biometric data evaluation and interpretation, standards, integration, and challenges. The course is divided into fundamental, modality, integration, and research building blocks to cover topics like identification, matching, fusion, standards, and interoperability.
This document outlines the structure and goals of a research study on the stability of iris recognition match scores over time. It introduces the problem statement around the lack of quantification of match score stability, and previews the research question, significance, purpose and scope, assumptions, limitations, and delimitations that will be discussed in the following chapters which focus on the literature review, methodology, results, and conclusions of the study.
According to a report by Frost and Sullivan in 2007, revenues for non-AFIS fingerprint devices in notebook PC's and wireless devices is anticipated to grow from $148.5 million to $1588.0 million by 2014, a compound annual growth rate of 40.3% [1]. The AFIS market has a compound annual growth rate of 15.2% with revenues of $445.0 million in 2007. With the development of mobile applications in a number of different market segments, such as healthcare, retail, and law enforcement, this paper analyzed the performance of fingerprints of different sizes, from different sensors...
This is a preview of the databases we use in the Center. The presentation overviews our data collection GUI, data storage (datawarehouse), and our project management database. Each of these databases work together to allow us to efficiently run our operations.
More from International Center for Biometric Research (20)
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
"Scaling RAG Applications to serve millions of users", Kevin GoedeckeFwdays
How we managed to grow and scale a RAG application from zero to thousands of users in 7 months. Lessons from technical challenges around managing high load for LLMs, RAGs and Vector databases.
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
ScyllaDB is making a major architecture shift. We’re moving from vNode replication to tablets – fragments of tables that are distributed independently, enabling dynamic data distribution and extreme elasticity. In this keynote, ScyllaDB co-founder and CTO Avi Kivity explains the reason for this shift, provides a look at the implementation and roadmap, and shares how this shift benefits ScyllaDB users.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
The Department of Veteran Affairs (VA) invited Taylor Paschal, Knowledge & Information Management Consultant at Enterprise Knowledge, to speak at a Knowledge Management Lunch and Learn hosted on June 12, 2024. All Office of Administration staff were invited to attend and received professional development credit for participating in the voluntary event.
The objectives of the Lunch and Learn presentation were to:
- Review what KM ‘is’ and ‘isn’t’
- Understand the value of KM and the benefits of engaging
- Define and reflect on your “what’s in it for me?”
- Share actionable ways you can participate in Knowledge - - Capture & Transfer
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Must Know Postgres Extension for DBA and Developer during MigrationMydbops
Mydbops Opensource Database Meetup 16
Topic: Must-Know PostgreSQL Extensions for Developers and DBAs During Migration
Speaker: Deepak Mahto, Founder of DataCloudGaze Consulting
Date & Time: 8th June | 10 AM - 1 PM IST
Venue: Bangalore International Centre, Bangalore
Abstract: Discover how PostgreSQL extensions can be your secret weapon! This talk explores how key extensions enhance database capabilities and streamline the migration process for users moving from other relational databases like Oracle.
Key Takeaways:
* Learn about crucial extensions like oracle_fdw, pgtt, and pg_audit that ease migration complexities.
* Gain valuable strategies for implementing these extensions in PostgreSQL to achieve license freedom.
* Discover how these key extensions can empower both developers and DBAs during the migration process.
* Don't miss this chance to gain practical knowledge from an industry expert and stay updated on the latest open-source database trends.
Mydbops Managed Services specializes in taking the pain out of database management while optimizing performance. Since 2015, we have been providing top-notch support and assistance for the top three open-source databases: MySQL, MongoDB, and PostgreSQL.
Our team offers a wide range of services, including assistance, support, consulting, 24/7 operations, and expertise in all relevant technologies. We help organizations improve their database's performance, scalability, efficiency, and availability.
Contact us: info@mydbops.com
Visit: https://www.mydbops.com/
Follow us on LinkedIn: https://in.linkedin.com/company/mydbops
For more details and updates, please follow up the below links.
Meetup Page : https://www.meetup.com/mydbops-databa...
Twitter: https://twitter.com/mydbopsofficial
Blogs: https://www.mydbops.com/blog/
Facebook(Meta): https://www.facebook.com/mydbops/
In our second session, we shall learn all about the main features and fundamentals of UiPath Studio that enable us to use the building blocks for any automation project.
📕 Detailed agenda:
Variables and Datatypes
Workflow Layouts
Arguments
Control Flows and Loops
Conditional Statements
💻 Extra training through UiPath Academy:
Variables, Constants, and Arguments in Studio
Control Flow in Studio
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...Fwdays
Direct losses from downtime in 1 minute = $5-$10 thousand dollars. Reputation is priceless.
As part of the talk, we will consider the architectural strategies necessary for the development of highly loaded fintech solutions. We will focus on using queues and streaming to efficiently work and manage large amounts of data in real-time and to minimize latency.
We will focus special attention on the architectural patterns used in the design of the fintech system, microservices and event-driven architecture, which ensure scalability, fault tolerance, and consistency of the entire system.
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...DanBrown980551
This LF Energy webinar took place June 20, 2024. It featured:
-Alex Thornton, LF Energy
-Hallie Cramer, Google
-Daniel Roesler, UtilityAPI
-Henry Richardson, WattTime
In response to the urgency and scale required to effectively address climate change, open source solutions offer significant potential for driving innovation and progress. Currently, there is a growing demand for standardization and interoperability in energy data and modeling. Open source standards and specifications within the energy sector can also alleviate challenges associated with data fragmentation, transparency, and accessibility. At the same time, it is crucial to consider privacy and security concerns throughout the development of open source platforms.
This webinar will delve into the motivations behind establishing LF Energy’s Carbon Data Specification Consortium. It will provide an overview of the draft specifications and the ongoing progress made by the respective working groups.
Three primary specifications will be discussed:
-Discovery and client registration, emphasizing transparent processes and secure and private access
-Customer data, centering around customer tariffs, bills, energy usage, and full consumption disclosure
-Power systems data, focusing on grid data, inclusive of transmission and distribution networks, generation, intergrid power flows, and market settlement data
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
"What does it really mean for your system to be available, or how to define w...Fwdays
We will talk about system monitoring from a few different angles. We will start by covering the basics, then discuss SLOs, how to define them, and why understanding the business well is crucial for success in this exercise.
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
2. Agenda
Problem statement & Goal
Data collection protocol
Results
C l i
Conclusions and Future work
d k
Biometric Standards, Performance & Assurance Laboratory | www.bspalabs.org
3. Problem Definition
Thermal Swipe Optical Touch Capacitive Touch
Matching fingerprints collected on different types
of sensors increases probability of false matches
of sensors increases probability of false matches
and false non‐matches
Biometric Standards, Performance & Assurance Laboratory | www.bspalabs.org
4. Goal
Acquisition
Technology
Interaction Sensor
Type Characteristics
Sensor
Interoperability
Create a statistical analysis framework to examine the
effect of sensor dependent distortions and variations
on False Non Match Rate (FNMR) of mixed datasets
Biometric Standards, Performance & Assurance Laboratory | www.bspalabs.org
5. Sensor Description
8 commercially available fingerprint sensors
8 commercially available fingerprint sensors
1 thermal swipe sensor
1 capacitive swipe sensor
4O i l
4 Optical touch sensors
h
2 Capacitive touch sensors
All sensors were 500 dpi resolution
Biometric Standards, Performance & Assurance Laboratory | www.bspalabs.org
7. Description of Participants
Total 190
Gender Male Female
131 59
Occupation Manual Laborer Office Worker
17 173
Age Groups < 30 years 30‐50 years > 50 years
156 23 11
Handedness Right Left Ambidextrous
164 23 3
Ethnicity Caucasian Black Hispanic American
American Asian Other
Indian
133 8 11 1 34 3
Biometric Standards, Performance & Assurance Laboratory | www.bspalabs.org
8. Data Analysis Methodology
• VeriFinger extractor
• Descriptive Stats
Minutiae
Count • Test of similarity
• NFIQ
• Descriptive Stats
Descriptive Stats
Image
Quality • Test of Similarity
• VeriFinger matcher
• Native and mixed datasets
FNMR
FNMR
Matrix • Test of proportions
Biometric Standards, Performance & Assurance Laboratory | www.bspalabs.org
12. Image Quality Analysis
Image quality computed using NFIQ
g q y p g Q
Overall Hypothesis:
H20: µi qscore = µ2 qscore……= µ9 qscore
: µ = µ =µ
H2 A: µi qscore ≠ µ2 qscore…..≠ µ9 qscore
Pairwise Comparisons:
Pairwise Comparisons:
H2’0: µi qscore = µj qscore for all i ≠ j
H2’A: µi qscore ≠ µj qscore for all i ≠ j
NFIQ uses a 3‐layer feed forward nonlinear perceptron model
to predict the image quality values based on the input feature
vector of the fingerprint image
vector of the fingerprint image
Performed a Kruskal Wallis Test of similarity of ranks
Biometric Standards, Performance & Assurance Laboratory | www.bspalabs.org
13. Tukey’s HSD Pairwise Test
D2 D3 D4 D5 D6 D7 D8
D1 S S S S S S S
D2 S S S S S S
D3 S S S S S
D4 S S NS S
D5 S S S
D6 S S
D7 S
S‐ Significant difference
S Significant difference
NS – Not Significant
Biometric Standards, Performance & Assurance Laboratory | www.bspalabs.org
16. Test of Homogeneity of Proportions
FNMR Matrix is useful for numerical comparison
p
Test of Homogeneity of FNMR was performed
between native FNMR and mixed FNMR
b i d i d
Compare multiple proportions using Marascuillo
Compare multiple proportions using Marascuillo
Procedure
Biometric Standards, Performance & Assurance Laboratory | www.bspalabs.org
17. Results
D1 D2 D3 D4 D5 D6 D7 D8
D1 S S S S S S S
D2 NS NS NS S S S NS
D3 S S NS NS S S NS
D4 S S NS NS S S NS
D5 S S NS NS S NS NS
D6 S S S NS S NS NS
D7 S S NS NS NS NS NS
D8 S S NS NS NS S NS
S‐ Significant difference
S Significant difference
NS – Not Significant
Biometric Standards, Performance & Assurance Laboratory | www.bspalabs.org
18. Impact of Quality on Interoperable FNMR
Removal of low quality images will reduce FNMR
q y g
of native and interoperable datasets
But will it make the FNMR of mixed datasets
similar to FNMR of native datasets?
i il f i d ?
FNMR matrix regenerated using VeriFinger 5 0 for
FNMR matrix regenerated using VeriFinger 5.0 for
datasets comprised of images with NFIQ score of
1, 2, or 3
The test of homogeneity of proportions was rerun
on native and mixed dataset FNMR
Biometric Standards, Performance & Assurance Laboratory | www.bspalabs.org
19. Results
D1 D2 D3 D4 D5 D6 D7 D8
D1 S S S S S S S
D2 NS NS NS S S NS NS
D3 S S NS NS S S NS
D4 S S NS NS S S NS
D5 S S NS NS S NS NS
D6 S S S S S S S
D7 S S NS NS NS NS NS
D8 S S NS NS NS S NS
S Significant difference
S‐ Significant difference
NS – Not Significant
Biometric Standards, Performance & Assurance Laboratory | www.bspalabs.org
20. Consistency of Placement
Interaction with different sensors can lead to inconsistent placement
due to sensor design, interaction type, capture area
Metric of consistency – detection of core
Core detected in both images Core detected in one image
Samples from different sensors – Samples from different sensors –
Correctly Verified Incorrectly rejected
Core detected in none of the images
Samples from same sensor – Correctly verified
Biometric Standards, Performance & Assurance Laboratory | www.bspalabs.org
21. Consistency of Placement
Interaction with different sensors can lead to
inconsistent placement due to sensor design,
interaction type, capture area
Metric of consistency detection of core
Metric of consistency – detection of core
D1,D6
D6,D1
Biometric Standards, Performance & Assurance Laboratory | www.bspalabs.org
22. Interoperability ‐ Interaction & Technology
A l d i t
Analyzed interoperability of datasets separated by
bilit f d t t t db
interaction and technology type
Created three datasets
1. Fingerprints collected from swipe sensors
g p p
2. Fingerprints collected from optical touch sensors
3. Fingerprints collected from capacitive touch sensors
g p p
Biometric Standards, Performance & Assurance Laboratory | www.bspalabs.org
23. Interoperability ‐ Interaction & Technology
TEST
Swipe
p Optical Capacitive
p p
Touch Touch
E Swipe 4.81 11.75 6.58
N
R
O Optical 11.93 1.53 1.89
L Touch
Capacitive 4.76 1.47 0.45
Touch
Biometric Standards, Performance & Assurance Laboratory | www.bspalabs.org
24. Conclusions
No technology specific impact on similarity of
gy p p y
minutiae count and quality score
Image quality analysis reduced FNMR, but did not
increase similarity of FNMR
i i il i f
Consistency of placement improved performance
of mixed datasets
of mixed datasets
Data collected from same interaction type had
lower FNMR
Biometric Standards, Performance & Assurance Laboratory | www.bspalabs.org
25. Future Work
Apply the analysis framework to test False Match
pp y y
Rates (FMR)
Removing low quality images on interoperable
datasets did not make FNMR more similar
d did k i il
Analyze which factors are affected by removal of low quality images
Further analysis into skin characteristics and its
Further analysis into skin characteristics and its
impact on image quality
Develop a detailed ridge spacing profile which can
be used as a sensor agnostic method for
transforming images and compensate for
El ti D f
Elastic Deformation
ti
Capture mechanisms
Biometric Standards, Performance & Assurance Laboratory | www.bspalabs.org
26. Upcoming Research Seminar
Paper presented at BTAS 2009-
2009
http://www.bspalabs.org/files/185/BTAS%20Fprint%20Se
nsor%20Interop.pdf
Slides available at
http://www.bspalabs.org/presentations-on-
demand
Next seminar will be on Human Biometric
Sensor Interaction – Dr Eric Kukula
Dr.
Feb 10th at 3:30pm (EST)
Sign up at
http://www.bspalabs.org/archives/1236
Biometric Standards, Performance & Assurance Laboratory | www.bspalabs.org
27. Thank You!
Questions…
Contact Information:
Shimon K. Modi, Ph.D.
modis@purdue.edu
BSPA L b
Laboratory | www.bspalabs.org
b l b
Purdue University, Knoy Hall of Technology
401 North Grant Street
West Lafayette, IN 47907 2021
47907-2021
Phone: (765) 494-2311
Fax: (765) 496-2700